Wondering why your load is missing every time you turn on your mobile data, even when using free Facebook? Well here is the solution.

published:05 Dec 2015

views:5855

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

published:08 May 2014

views:1249

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

published:13 May 2017

views:892

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

published:27 Jun 2017

views:21

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as:

The challenge of data privacy is to utilize data while protecting individual's privacy preferences and their personally identifiable information. The fields of data security and information security design and utilize software, hardware and human resources to address this issue. As the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and continually reassess compliance with data privacy and security regulations.

Thunderbolt (interface)

Thunderbolt is the brand name of a hardware interface that allows the connection of external peripherals to a computer. Thunderbolt 1 and 2 use the same connector as Mini DisplayPort (MDP), while Thunderbolt 3 uses USB Type-C. It was initially developed and marketed under the name Light Peak, and first sold as part of a consumer product on February 24, 2011.

Description

The interface was originally intended to run exclusively on an optical physical layer using components and flexible optical fiber cabling developed by Intel partners and at Intel's Silicon Photonics lab. It was initially marketed under the name Light Peak, and after 2011 as Silicon Photonics Link. However, it was discovered that conventional copper wiring could furnish the desired 10Gbit/s per channel at lower cost.

5 Steps to prevent "Nakaw Load" on Globe and TM Prepaid

Wondering why your load is missing every time you turn on your mobile data, even when using free Facebook? Well here is the solution.

4:12

HP Connected Backup Mobile Data Protection Whiteboard

HP Connected Backup Mobile Data Protection Whiteboard

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

13:05

Beyond the Data - Working to Eliminate Measles Around the Globe

Beyond the Data - Working to Eliminate Measles Around the Globe

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

5 Steps to prevent "Nakaw Load" on Globe and TM Prepaid

Wondering why your load is missing every time you turn on your mobile data, even when using free Facebook? Well here is the solution.

published: 05 Dec 2015

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the ne...

published: 08 May 2014

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Secured Globe "Tick" Hidden Data Driver

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the ...

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content...

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mob...

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented w...

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leavi...

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver eve...

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

5 Steps to prevent "Nakaw Load" on Globe and TM Prepaid

Wondering why your load is missing every time you turn on your mobile data, even when using free Facebook? Well here is the solution.

published: 05 Dec 2015

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the ne...

published: 08 May 2014

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Secured Globe "Tick" Hidden Data Driver

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the ...

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content...

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mob...

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented w...

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leavi...

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver eve...

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

Advanced Threat Protection and Advanced Threat Analytics Webinar

Hackers around the globe today are launching increasingly sophisticated cyberattacks, and many organizations are seeking tools that provide advanced protection. In the wake of so many data breaches and threats, schools must now ensure they are using the right technology tools that will protect their data and ensure their students’ privacy.
In this session you’ll hear from Cloud experts on how you can protect your institution using Advanced ThreatProtection and Advanced Threat Analytics. We’ll discuss how to protect your email in real time against unknown and sophisticated attacks, protect against unsafe attachments, get rich reporting, track links in messages, and protect your environment when users click malicious links.
Additionally, you’ll see how this latest technology solution prov...

published: 27 Apr 2016

CPDP 2016: Accountability in Practice

Accountability in PracticeOrganized by CPDP
Chair: Daniel Guagnin, TU Berlin (DE)
Moderator: BojanaBellamy, Hunton & Williams LLP (UK)
Panel: Oran Kiazim, SterlingBackcheck (UK), Lokke Moerel, Morrison & Foerster (NL), Siani Pearson, HP (UK), Lauren Reid, Nymity (CA)
Accountability refers to implementing a robust privacy programme and being able to demonstrate it. Many regulators now expect organisations to be accountable, and some laws are incorporating it as a matter of legal compliance. Requirements for accountability are prevalent throughout the EU GDPR and BCR framework, and regulators across the globe are publishing guidance on what it means to be accountable. This session will define how to be accountable, connecting the concept of accountability with how it is applied in pra...

About the Digital Marketing Institute
The Digital Marketing Institute is the global certification standard in digital marketing education, producing more graduates trained to a single digital marketing standard than any other certification body.
The Digital Marketing Institute works with global digital experts and leaders to define the skills and qualifications required by today’s digital marketing professionals, certifying candidates to Diploma, Postgraduate and Masters levels all over the globe.

published: 10 Feb 2017

CPDP 2015: The right to be forgotten. European and international perspectives.

Recorded on Mar 24 2016 at GCPNEXT 2016 in San Francisco.
Get insights about Google’s security technology underpinnings within GCP that protect your data and your customers. Learn about Google’s views on threats, end-to-end security, and solutions at each point of potential compromise.
Speakers: AndyChang and Ameet Jani, Google

published: 29 Mar 2016

OT Security and Critical Infrastructure Protection: The Fundamentals

For more webinars, go to: http://www.infonetics.com/infonetics-events/
OVERVIEW
The publicity surrounding the discovery of the Stuxnet worm in 2010 forced companies around the globe to take a serious look at the security posture of their OT (operational technology), particularly the security and visibility of SCADA and ICS operations. Solving the broad security problem for OT requires a deep understanding of cyber-physical systems, facilities and product development practices. The increasing connectivity of intelligent machines is compelling companies to take steps to secure their industrial devices, the supply chain and more. This webinar looks at fundamental OT security practices that OT managers and planners need to know to mitigate risks across people, processes and technologies.
WHO...

published: 28 Sep 2015

DesignTalk Ep. 57: The new rules of designing with data

Find more episodes at https://www.invisionapp.com/webinars
---
Personal data has long been the raw material of the digital economy—its use has created value for businesses and their shareholders.
But all of this is changing—consumer trust is in a downward spiral, regulations are evolving, and people will soon be in control of their own data. We need to rethink how we ask for, acquire, and make use of personal data.
In this DesignTalk, NathanKinch, Founding Partner of Greater thanExperience Design and Head of Ecosystem Value and Growth at Mecco, shares his insights from the leading edge of the personal data market. He presents practical examples to support the 3 design rules of data minimization, and provides a toolkit to assist with the application of these rules.
---
InVision is t...

Recorded on Mar 23 2016 at GCPNEXT 2016 in San Francisco.
Scale your applications from zero to full-throttle with Google CloudLoadBalancing - no pre-warming needed. You have full flexibility in instantiating your load balanced compute resources in single or multiple regions wherever your users are, front-ending these with a single anycast IP, and growing or shrinking your resources with intelligent Autoscaling. Learn about Google Cloud Load Balancing, its flavors and features, its integration with Google Cloud CDN for optimized delivery, and how it enables you to build highly-available, scalable, low-latency cloud services with a global footprint.
Speakers: Dmitry Shestak, Wix & AnnaBerenberg, MattSmart, Prajakta Joshi, Google

Advanced Threat Protection and Advanced Threat Analytics Webinar

Hackers around the globe today are launching increasingly sophisticated cyberattacks, and many organizations are seeking tools that provide advanced protection....

Hackers around the globe today are launching increasingly sophisticated cyberattacks, and many organizations are seeking tools that provide advanced protection. In the wake of so many data breaches and threats, schools must now ensure they are using the right technology tools that will protect their data and ensure their students’ privacy.
In this session you’ll hear from Cloud experts on how you can protect your institution using Advanced ThreatProtection and Advanced Threat Analytics. We’ll discuss how to protect your email in real time against unknown and sophisticated attacks, protect against unsafe attachments, get rich reporting, track links in messages, and protect your environment when users click malicious links.
Additionally, you’ll see how this latest technology solution provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline.

Hackers around the globe today are launching increasingly sophisticated cyberattacks, and many organizations are seeking tools that provide advanced protection. In the wake of so many data breaches and threats, schools must now ensure they are using the right technology tools that will protect their data and ensure their students’ privacy.
In this session you’ll hear from Cloud experts on how you can protect your institution using Advanced ThreatProtection and Advanced Threat Analytics. We’ll discuss how to protect your email in real time against unknown and sophisticated attacks, protect against unsafe attachments, get rich reporting, track links in messages, and protect your environment when users click malicious links.
Additionally, you’ll see how this latest technology solution provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline.

Accountability in PracticeOrganized by CPDP
Chair: Daniel Guagnin, TU Berlin (DE)
Moderator: BojanaBellamy, Hunton & Williams LLP (UK)
Panel: Oran Kiazim, SterlingBackcheck (UK), Lokke Moerel, Morrison & Foerster (NL), Siani Pearson, HP (UK), Lauren Reid, Nymity (CA)
Accountability refers to implementing a robust privacy programme and being able to demonstrate it. Many regulators now expect organisations to be accountable, and some laws are incorporating it as a matter of legal compliance. Requirements for accountability are prevalent throughout the EU GDPR and BCR framework, and regulators across the globe are publishing guidance on what it means to be accountable. This session will define how to be accountable, connecting the concept of accountability with how it is applied in practice. The panel will present bench-marking data from over 100 organisations, research gathered through workshops with privacy offices all over the world, and specific case studies from leading organisations. The panel will also discuss concrete processes and activities that organisations can implement in order to achieve compliance objectives and go above and beyond obligations to process data responsibly. In particular, the panel will address the following questions:
- What does a privacy management programme look like in practice?
- What is an accountability approach to compliance?
- How do accountable organisations stand ready to demonstrate compliance?
- What are common priorities for privacy management in the EU and globally?

Accountability in PracticeOrganized by CPDP
Chair: Daniel Guagnin, TU Berlin (DE)
Moderator: BojanaBellamy, Hunton & Williams LLP (UK)
Panel: Oran Kiazim, SterlingBackcheck (UK), Lokke Moerel, Morrison & Foerster (NL), Siani Pearson, HP (UK), Lauren Reid, Nymity (CA)
Accountability refers to implementing a robust privacy programme and being able to demonstrate it. Many regulators now expect organisations to be accountable, and some laws are incorporating it as a matter of legal compliance. Requirements for accountability are prevalent throughout the EU GDPR and BCR framework, and regulators across the globe are publishing guidance on what it means to be accountable. This session will define how to be accountable, connecting the concept of accountability with how it is applied in practice. The panel will present bench-marking data from over 100 organisations, research gathered through workshops with privacy offices all over the world, and specific case studies from leading organisations. The panel will also discuss concrete processes and activities that organisations can implement in order to achieve compliance objectives and go above and beyond obligations to process data responsibly. In particular, the panel will address the following questions:
- What does a privacy management programme look like in practice?
- What is an accountability approach to compliance?
- How do accountable organisations stand ready to demonstrate compliance?
- What are common priorities for privacy management in the EU and globally?

About the Digital Marketing Institute
The Digital Marketing Institute is the global certification standard in digital marketing education, producing more gradu...

About the Digital Marketing Institute
The Digital Marketing Institute is the global certification standard in digital marketing education, producing more graduates trained to a single digital marketing standard than any other certification body.
The Digital Marketing Institute works with global digital experts and leaders to define the skills and qualifications required by today’s digital marketing professionals, certifying candidates to Diploma, Postgraduate and Masters levels all over the globe.

About the Digital Marketing Institute
The Digital Marketing Institute is the global certification standard in digital marketing education, producing more graduates trained to a single digital marketing standard than any other certification body.
The Digital Marketing Institute works with global digital experts and leaders to define the skills and qualifications required by today’s digital marketing professionals, certifying candidates to Diploma, Postgraduate and Masters levels all over the globe.

published:10 Feb 2017

views:51

back

CPDP 2015: The right to be forgotten. European and international perspectives.

Organised by Chuo University and Tilburg UniversityChair: Ronald Leenes, TILT/PI.Lab (NL)
Moderator: AnnaFielder, Privacy International (UK)
Panel: Hiroshi Miyashita, Chuo University (JP), Artemi Rallo Lombarte, Jaume I University (SP), Marc Rotenberg, EPIC (US)
The Right to be Forgotten is one of the most controversial (new) rights in the proposed upcoming General Data Protection Regulation. The GoogleSpain ruling by the CJEU (Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González, C131/12, ECLI:EU:C:2014:317) of 13 May 2014 made clear that an RtbF in fact already exits under the DataProtection Directive 95/46/EC. The Court held that the processing of data which is “inadequate, irrelevant or excessive” (i.e. not merely inaccurate) might also be incompatible with the Directive. In such cases, where the data is incompatible with the provisions of article 6(1)(e) to (f) of the Directive, relating to data quality, the information and links in the list of results must be erased by search engines. Since the CJEU ruling the debates regarding the meaning and scope of an RtbF have taken a new turn, Google and others have taken steps to implement the judgment and policy makers and supervisory authorities have taken further steps to clarify the right and devise practical procedures for implementing it.
It is fair to say that there have been a variety of responses to the CJEU judgment. One of the factors influencing peoples‘ responses to the very idea of ‘a right to be removed from search engine results’ is their cultural background. Another important point of discussion is the enforceability of this ‘right’. In this panel we explore the different perceptions of the RtbF as framed by the CJEU with respect to search engines in the US, Europe and Asia. The panel will address topics such as:
What are the dominant opinions about the right as clarified by the CJEU in different regions around the globe?
How does the RtbF relate to other rights, such as freedom of expression and freedom of information in different regions?
Who decides what to take down and under what criteria?
How we can ensure a transparent and accountable deletion mechanism?
How we can streamline the RtbF in different jurisdictions offered by the same global service?

Organised by Chuo University and Tilburg UniversityChair: Ronald Leenes, TILT/PI.Lab (NL)
Moderator: AnnaFielder, Privacy International (UK)
Panel: Hiroshi Miyashita, Chuo University (JP), Artemi Rallo Lombarte, Jaume I University (SP), Marc Rotenberg, EPIC (US)
The Right to be Forgotten is one of the most controversial (new) rights in the proposed upcoming General Data Protection Regulation. The GoogleSpain ruling by the CJEU (Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González, C131/12, ECLI:EU:C:2014:317) of 13 May 2014 made clear that an RtbF in fact already exits under the DataProtection Directive 95/46/EC. The Court held that the processing of data which is “inadequate, irrelevant or excessive” (i.e. not merely inaccurate) might also be incompatible with the Directive. In such cases, where the data is incompatible with the provisions of article 6(1)(e) to (f) of the Directive, relating to data quality, the information and links in the list of results must be erased by search engines. Since the CJEU ruling the debates regarding the meaning and scope of an RtbF have taken a new turn, Google and others have taken steps to implement the judgment and policy makers and supervisory authorities have taken further steps to clarify the right and devise practical procedures for implementing it.
It is fair to say that there have been a variety of responses to the CJEU judgment. One of the factors influencing peoples‘ responses to the very idea of ‘a right to be removed from search engine results’ is their cultural background. Another important point of discussion is the enforceability of this ‘right’. In this panel we explore the different perceptions of the RtbF as framed by the CJEU with respect to search engines in the US, Europe and Asia. The panel will address topics such as:
What are the dominant opinions about the right as clarified by the CJEU in different regions around the globe?
How does the RtbF relate to other rights, such as freedom of expression and freedom of information in different regions?
Who decides what to take down and under what criteria?
How we can ensure a transparent and accountable deletion mechanism?
How we can streamline the RtbF in different jurisdictions offered by the same global service?

Recorded on Mar 24 2016 at GCPNEXT 2016 in San Francisco.
Get insights about Google’s security technology underpinnings within GCP that protect your data and ...

Recorded on Mar 24 2016 at GCPNEXT 2016 in San Francisco.
Get insights about Google’s security technology underpinnings within GCP that protect your data and your customers. Learn about Google’s views on threats, end-to-end security, and solutions at each point of potential compromise.
Speakers: AndyChang and Ameet Jani, Google

Recorded on Mar 24 2016 at GCPNEXT 2016 in San Francisco.
Get insights about Google’s security technology underpinnings within GCP that protect your data and your customers. Learn about Google’s views on threats, end-to-end security, and solutions at each point of potential compromise.
Speakers: AndyChang and Ameet Jani, Google

DesignTalk Ep. 57: The new rules of designing with data

Find more episodes at https://www.invisionapp.com/webinars
---
Personal data has long been the raw material of the digital economy—its use has created value f...

Find more episodes at https://www.invisionapp.com/webinars
---
Personal data has long been the raw material of the digital economy—its use has created value for businesses and their shareholders.
But all of this is changing—consumer trust is in a downward spiral, regulations are evolving, and people will soon be in control of their own data. We need to rethink how we ask for, acquire, and make use of personal data.
In this DesignTalk, NathanKinch, Founding Partner of Greater thanExperience Design and Head of Ecosystem Value and Growth at Mecco, shares his insights from the leading edge of the personal data market. He presents practical examples to support the 3 design rules of data minimization, and provides a toolkit to assist with the application of these rules.
---
InVision is the world’s leading product design collaboration platform, trusted by more than 1.5 million designers at companies like Uber, Netflix and Twitter. InVision empowers teams of all sizes to prototype, review, iterate, manage and test web and mobile apps—all without a single line of code.
Get InVision free forever: http://invs.io/1QOCxZq
---
See who else uses InVision: http://invs.io/1QOD5P3
Stay up to date on the latest trends in product design: http://invs.io/1QOD91g
Follow InVision on Twitter: http://twitter.com/InVisionApp/

Find more episodes at https://www.invisionapp.com/webinars
---
Personal data has long been the raw material of the digital economy—its use has created value for businesses and their shareholders.
But all of this is changing—consumer trust is in a downward spiral, regulations are evolving, and people will soon be in control of their own data. We need to rethink how we ask for, acquire, and make use of personal data.
In this DesignTalk, NathanKinch, Founding Partner of Greater thanExperience Design and Head of Ecosystem Value and Growth at Mecco, shares his insights from the leading edge of the personal data market. He presents practical examples to support the 3 design rules of data minimization, and provides a toolkit to assist with the application of these rules.
---
InVision is the world’s leading product design collaboration platform, trusted by more than 1.5 million designers at companies like Uber, Netflix and Twitter. InVision empowers teams of all sizes to prototype, review, iterate, manage and test web and mobile apps—all without a single line of code.
Get InVision free forever: http://invs.io/1QOCxZq
---
See who else uses InVision: http://invs.io/1QOD5P3
Stay up to date on the latest trends in product design: http://invs.io/1QOD91g
Follow InVision on Twitter: http://twitter.com/InVisionApp/

Recorded on Mar 23 2016 at GCPNEXT 2016 in San Francisco.
Scale your applications from zero to full-throttle with Google CloudLoadBalancing - no pre-warming needed. You have full flexibility in instantiating your load balanced compute resources in single or multiple regions wherever your users are, front-ending these with a single anycast IP, and growing or shrinking your resources with intelligent Autoscaling. Learn about Google Cloud Load Balancing, its flavors and features, its integration with Google Cloud CDN for optimized delivery, and how it enables you to build highly-available, scalable, low-latency cloud services with a global footprint.
Speakers: Dmitry Shestak, Wix & AnnaBerenberg, MattSmart, Prajakta Joshi, Google

Recorded on Mar 23 2016 at GCPNEXT 2016 in San Francisco.
Scale your applications from zero to full-throttle with Google CloudLoadBalancing - no pre-warming needed. You have full flexibility in instantiating your load balanced compute resources in single or multiple regions wherever your users are, front-ending these with a single anycast IP, and growing or shrinking your resources with intelligent Autoscaling. Learn about Google Cloud Load Balancing, its flavors and features, its integration with Google Cloud CDN for optimized delivery, and how it enables you to build highly-available, scalable, low-latency cloud services with a global footprint.
Speakers: Dmitry Shestak, Wix & AnnaBerenberg, MattSmart, Prajakta Joshi, Google

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

HP Connected Backup Mobile Data Protection Whiteboard

To learn more about HP ConnectedBackup, visit http://www.autonomy.com/products/connected-backup.
It's time to protect and leverage all corporate data in a mobile and BYOD world. HP Connected backup is an enterprise-proven, litigation-ready mobile user data protection solution. Today, close to 5 million corporate users rely on HP Connected Backup to protect and provide access to their business critical information around the globe. With anywhere access to protected data, the mobile workforce can remain productive, while dramatically reducing the cost and risk associated with compliance and eDiscovery requirements.
HP Connected Backup simplifies and streamlines data migration during desktop refresh. It enables fast, reliable, and secure migration of data to new PCs, and eliminates the need for costly and laborious migration tools and IT intervention. HP offers flexible deployment strategies for HP Connected Backup, including on-premise, cloud-based, or a hybrid configuration that combines the best of on-premise and hosted approaches.

Beyond the Data - Working to Eliminate Measles Around the Globe

Dr. Phoebe Thorpe and Dr. Peter Strebel discuss the ongoing challenges to eliminating measles worldwide. Measles is highly infectious, but it can be prevented with financial and political commitment by all countries around the globe.
Individuals should know that:
• One case of measles anywhere poses risks everywhere,
• On-time, routine vaccination is safe and effective and
• Widespread vaccination coverage is key to elimination.
Comments on this video are allowed in accordance with our comment policy: http://www.cdc.gov/SocialMedia/Tools/CommentPolicy.html
This video can also be viewed at
http://www.cdc.gov/cdcgrandrounds/video/2015/btd/BTDWorkingToEliminateMeasles.mp4

Global Cyberattack on Healthcare Facilities Across the Globe

Brazil is the latest nation to be affected by Friday's global cyberattack.
It infected computers at healthcare facilities and businesses across the world, leaving thousands of companies vulnerable.
This attack is alarming because of its size and how fast it spread --hitting more than 70 countries including the U.S., U.K., India, Spain, China, and Russia.
A 22-year-old British researcher is being credited for "accidentally" stopping the global cyberattack.
The cyberattack on Friday hit hundreds of thousands of computers around the globe at hospitals, government offices, transportation systems and major companies.
The attack appeared to be the largest cyberattack of its kind in history.
Hackers used a Microsoft Windows flaw --- the leaked flaw was once secretly used as a cyber weapon by the U.S. National Security Agency.
“Cyber hacking can damage or even destroy our transport industries, our scientific research, our health service and indeed a lot of our education services," said Jeremy Corbyn, Labour Party leader.
Hackers exploited the software to infect computers with ransomware that's called "Wanna Cry."
They did it through spam email and attachments.
What does the ransomware do exactly?
Well, it locks your computer -- holding your data hostage.
The result-- a user must then either pay a ransom - or their data will be deleted.
“We all rely on computers and instant information, our health records and all that goes with it but what we have got is a bunch of 21st century highway robbers that have hacked into our NHS and basically offering protection money to get information back in order to treat cancer patients or anybody else. It is unbelievably disgusting," said Corbyn.
This virus affected 20 percent of Britain’s National Health Service-- most of which is back online now.
However, many were forced to cancel routine procedures and emergency room services were scaled down.
The U.K. prime minister called the attack on hospitals absolutely disgusting.
In the midst of all the chaos, a young British researcher happened to stumble upon and activate a "kill switch" stopping the spread of the global cyberattack.
The young man, whose twitter handle is Malware Tech Blog, said it was an
He outlined how he happened to buy a random domain name for just $10.69.
By purchasing that domain and registering it, the young researcher said he activated a kill switch that immediately slowed down the spread of the malware.
Going forward, we will ensure that the National Cyber Security Centre is able to continue to advise and support, as they are doing for this particular attack that has taken place. There's no evidence that patient records have been compromised
Microsoft had released a security update to protect against this very attack in March.
All Microsoft Windows users are urged to download it.
At this time, no one has claimed responsibility yet for the attack.
-- MELISSA ETEZADI
FollowMelissa @MelissaEtezadi

Overview
The premier storage choice for creative audio/video professionals and multimedia enthusiasts around the globe, the PROMISE Pegasus2 now can deliver even faster performance with the new 20 Gb/s Thunderbolt 2 technology, while assuring enterprise-class reliability and ease of use.
Blazing speed for creative workflows
The Pegasus2 is the fastest Thunderbolt 2 storage solution available, delivering raw power for audio/video/graphics amateurs and professionals to experience new capabilities such as easily working with multiple compressed 4K streams. Final Cut professionals can ingest, edit, and play back multiple streams of ProRes 422 (HQ), ProRes4444 as well as uncompressed HD 10-bit and 12-bit video while protecting valuable workflows, audio sessions, and other creative media content. Pegasus2 also works well for popular applications such as iTunes, iPhoto, iMovie, Garageband, Photoshop, and media center applications.
Simple, flexible, and cost-effective backup solutions
Fast, safe, and reliable external storage is essential when protecting your valuable files such as music, photos, and videos. Backup your irreplaceable digital media, documents, and also your entire computer or workstation to Pegasus2 with Time Machine in OS X.
Easy to use, quiet, and eco-smart
Pegasus2 systems are user-friendly, and come pre-configured straight out of the box—so you can just plug in and start using. Status, management tools, and advanced settings can be accessed via the built-in Promise utility. Engineered to be eco-friendly and RoHS compliant, Pegasus2 is perfect for SMB environments.
Enterprise-classRAID protection
Pegasus2 features enterprise-level RAID storage protection for your data, supporting a broad range of RAID levels as well as automatic error handling.
About Thunderbolt 2
Thunderbolt is a revolutionary I/O technology that supports high-resolution displays and high-performance data devices via one simple port and a cable that carries both DisplayPort and PCI Express data. And it’s standard on every Mac.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt, which means you can get PCI Express speed outside the box.
With Thunderbolt 2 now built into the new Mac Pro and MacBook Pro with Retina display, you can connect up to three 4K displays at once. Thunderbolt 2 gives you up to 20 Gbps in both directions, allowing for super-fast data transfer between peripherals. You also have enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch.
Thunderbolt also provides double the power of USB 3.0, delivering 10 watts to peripherals for improved performance on the go.
HighlightsChoice of raw capacities: 24TB of raw capacity (21TB pre-configured to RAID 5, pre-formatted with HFS+) or 32TB of raw capacity (28TB pre-configured to RAID 5, pre-formatted with HFS+)
Advanced RAID engine, supports RAID 0, 1, 5, 6, 10
Robust error handling provides superior data protection
Reliable, rugged yet elegant enclosure, ultra-quiet design
Two Thunderbolt 2 ports for daisy chaining up to six Pegasus units, Apple Thunderbolt Displays, or Mini DisplayPort devices
Hot-swappable bays for effortless drive access and serviceability
Built-in Promise Utility for systems management and advanced settings
Backward compatible with 10 Gb/s Thunderbolt hosts and devices
Did you notice?
Pegasus2 systems come pre-configured straight out of the box—so you can just plug in and start using them.
Apple Recommends For
Take advantage of 20 Gb/s Thunderbolt 2 performance for creative audio/video projects on your Mac Pro.
What’s in the Box?
Pegasus2 R8 Storage unit
24TB model has eight 3TB 7200-rpm removable hard drives; 32TB has eight 4TB 7200-rpm removable hard drives)

http://www.pepperl-fuchs.com – In its SolutionEngineering Centers (SEC), Pepperl+Fuchs manufactures customized explosion protection solutions. Lutz Liebers, PresidentDivisionProcess Automation at Pepperl+Fuchs, gives an insight into the world of the SECs: spread over all continents, the SECs are always close by, and our experts are able to support customers with their know-how everywhere. As a result, customers worldwide receive tailor-made solutions, which are engineered, manufactured, and certified according to their individual needs, standards, and local conditions – from one single source.

Advanced Threat Protection and Advanced Threat Analytics Webinar

Hackers around the globe today are launching increasingly sophisticated cyberattacks, and many organizations are seeking tools that provide advanced protection. In the wake of so many data breaches and threats, schools must now ensure they are using the right technology tools that will protect their data and ensure their students’ privacy.
In this session you’ll hear from Cloud experts on how you can protect your institution using Advanced ThreatProtection and Advanced Threat Analytics. We’ll discuss how to protect your email in real time against unknown and sophisticated attacks, protect against unsafe attachments, get rich reporting, track links in messages, and protect your environment when users click malicious links.
Additionally, you’ll see how this latest technology solution provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline.

CPDP 2016: Accountability in Practice

Accountability in PracticeOrganized by CPDP
Chair: Daniel Guagnin, TU Berlin (DE)
Moderator: BojanaBellamy, Hunton & Williams LLP (UK)
Panel: Oran Kiazim, SterlingBackcheck (UK), Lokke Moerel, Morrison & Foerster (NL), Siani Pearson, HP (UK), Lauren Reid, Nymity (CA)
Accountability refers to implementing a robust privacy programme and being able to demonstrate it. Many regulators now expect organisations to be accountable, and some laws are incorporating it as a matter of legal compliance. Requirements for accountability are prevalent throughout the EU GDPR and BCR framework, and regulators across the globe are publishing guidance on what it means to be accountable. This session will define how to be accountable, connecting the concept of accountability with how it is applied in practice. The panel will present bench-marking data from over 100 organisations, research gathered through workshops with privacy offices all over the world, and specific case studies from leading organisations. The panel will also discuss concrete processes and activities that organisations can implement in order to achieve compliance objectives and go above and beyond obligations to process data responsibly. In particular, the panel will address the following questions:
- What does a privacy management programme look like in practice?
- What is an accountability approach to compliance?
- How do accountable organisations stand ready to demonstrate compliance?
- What are common priorities for privacy management in the EU and globally?

About the Digital Marketing Institute
The Digital Marketing Institute is the global certification standard in digital marketing education, producing more graduates trained to a single digital marketing standard than any other certification body.
The Digital Marketing Institute works with global digital experts and leaders to define the skills and qualifications required by today’s digital marketing professionals, certifying candidates to Diploma, Postgraduate and Masters levels all over the globe.

1:15:53

CPDP 2015: The right to be forgotten. European and international perspectives.

Organised by Chuo University and Tilburg University
Chair: Ronald Leenes, TILT/PI.Lab (NL...

CPDP 2015: The right to be forgotten. European and international perspectives.

Organised by Chuo University and Tilburg UniversityChair: Ronald Leenes, TILT/PI.Lab (NL)
Moderator: AnnaFielder, Privacy International (UK)
Panel: Hiroshi Miyashita, Chuo University (JP), Artemi Rallo Lombarte, Jaume I University (SP), Marc Rotenberg, EPIC (US)
The Right to be Forgotten is one of the most controversial (new) rights in the proposed upcoming General Data Protection Regulation. The GoogleSpain ruling by the CJEU (Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González, C131/12, ECLI:EU:C:2014:317) of 13 May 2014 made clear that an RtbF in fact already exits under the DataProtection Directive 95/46/EC. The Court held that the processing of data which is “inadequate, irrelevant or excessive” (i.e. not merely inaccurate) might also be incompatible with the Directive. In such cases, where the data is incompatible with the provisions of article 6(1)(e) to (f) of the Directive, relating to data quality, the information and links in the list of results must be erased by search engines. Since the CJEU ruling the debates regarding the meaning and scope of an RtbF have taken a new turn, Google and others have taken steps to implement the judgment and policy makers and supervisory authorities have taken further steps to clarify the right and devise practical procedures for implementing it.
It is fair to say that there have been a variety of responses to the CJEU judgment. One of the factors influencing peoples‘ responses to the very idea of ‘a right to be removed from search engine results’ is their cultural background. Another important point of discussion is the enforceability of this ‘right’. In this panel we explore the different perceptions of the RtbF as framed by the CJEU with respect to search engines in the US, Europe and Asia. The panel will address topics such as:
What are the dominant opinions about the right as clarified by the CJEU in different regions around the globe?
How does the RtbF relate to other rights, such as freedom of expression and freedom of information in different regions?
Who decides what to take down and under what criteria?
How we can ensure a transparent and accountable deletion mechanism?
How we can streamline the RtbF in different jurisdictions offered by the same global service?

Recorded on Mar 24 2016 at GCPNEXT 2016 in San Francisco.
Get insights about Google’s security technology underpinnings within GCP that protect your data and your customers. Learn about Google’s views on threats, end-to-end security, and solutions at each point of potential compromise.
Speakers: AndyChang and Ameet Jani, Google

1:01:22

OT Security and Critical Infrastructure Protection: The Fundamentals

For more webinars, go to: http://www.infonetics.com/infonetics-events/
OVERVIEW
The publi...

DesignTalk Ep. 57: The new rules of designing with data

Find more episodes at https://www.invisionapp.com/webinars
---
Personal data has long been the raw material of the digital economy—its use has created value for businesses and their shareholders.
But all of this is changing—consumer trust is in a downward spiral, regulations are evolving, and people will soon be in control of their own data. We need to rethink how we ask for, acquire, and make use of personal data.
In this DesignTalk, NathanKinch, Founding Partner of Greater thanExperience Design and Head of Ecosystem Value and Growth at Mecco, shares his insights from the leading edge of the personal data market. He presents practical examples to support the 3 design rules of data minimization, and provides a toolkit to assist with the application of these rules.
---
InVision is the world’s leading product design collaboration platform, trusted by more than 1.5 million designers at companies like Uber, Netflix and Twitter. InVision empowers teams of all sizes to prototype, review, iterate, manage and test web and mobile apps—all without a single line of code.
Get InVision free forever: http://invs.io/1QOCxZq
---
See who else uses InVision: http://invs.io/1QOD5P3
Stay up to date on the latest trends in product design: http://invs.io/1QOD91g
Follow InVision on Twitter: http://twitter.com/InVisionApp/

24:55

A Day in the Life of an Analyst | LogRhythm Demo

LogRhythm, a leader in security intelligence and analytics, empowers organizations around ...

Recorded on Mar 23 2016 at GCPNEXT 2016 in San Francisco.
Scale your applications from zero to full-throttle with Google CloudLoadBalancing - no pre-warming needed. You have full flexibility in instantiating your load balanced compute resources in single or multiple regions wherever your users are, front-ending these with a single anycast IP, and growing or shrinking your resources with intelligent Autoscaling. Learn about Google Cloud Load Balancing, its flavors and features, its integration with Google Cloud CDN for optimized delivery, and how it enables you to build highly-available, scalable, low-latency cloud services with a global footprint.
Speakers: Dmitry Shestak, Wix & AnnaBerenberg, MattSmart, Prajakta Joshi, Google

The New EU Data Protection Regulation...

Advanced Threat Protection and Advanced Threat Ana...

CPDP 2016: Accountability in Practice...

Data Protection for marketing professionals with H...

CPDP 2015: The right to be forgotten. European and...

INFRASTRUCTURE & OPERATIONS - Have cloud your way:...

OT Security and Critical Infrastructure Protection...

DesignTalk Ep. 57: The new rules of designing with...

A Day in the Life of an Analyst | LogRhythm Demo...

INFRASTRUCTURE & OPERATIONS - Load Balancing, Auto...

When the sun dims dramatically Monday morning, that would be like an entire power plant unit shutting down for the Lone Star State's electricity grid. The much-anticipated solar eclipse will wipe out about 600 megawatts worth of electricity generation from Texas' growing solar power industry, according to officials with ERCOT, which manages the Texas grid.&nbsp; ... "That is not very much," she said about eclipse's influence ... ....

Multiple media reports Thursday reported a van crashed into dozens of people in the center of Barcelona Thursday killing two and injuring several people. Local Spanish media say two armed men have entered a restaurant after a van crashed into a crowd of people, according to Reuters, and police consider the incident to be terror related. Local media reports say two people were killed instantly when struck by the van....

The number of asylum seekers who are illegally crossing into Canada from the United States more than tripled last month, according to new data released on Thursday by the Canadian government which hints at the deep fears that migrants have about the recent U.S. administration immigration crackdown ... who were facing potential deportation when their temporary protected status that was given after the 2010 earthquake and hurricane ... ....

The Guardian reported that police announced one person was arrested in relation to the attack on Thursday where someone drove a white van through the busy, pedestrian area of Las Ramblas in Barcelona, Spain which has left at least 13 dead, and more than 50 injured ...Police said that the number of the dead was "bound to rise" since at least 50 people were injured after the attack, interior minister for Catalonia, Joaquim Form said ... ... U.S....

The top two officers and the top enlisted sailors who were in charge when the USS Fitzgerald had a collision on June 17 that killed seven crew members will face disciplinary measures after seven crew members died from the incident, a senior Navy official said on Thursday. The Washington Post reported that Adm. William F ... The discipline varies but will include likely career-ending actions against the ship's captain at the time, Cmdr....

search tools

You can search using any combination of the items listed below.

In the first draft of DataProtection and Governance Act, the Union IT and electronics ministry has proposed to put all digital data captured through handheld, desktop or systems manually or through biometric and point of sale (PoS) devices, card swiping machines among others under the ambit of the proposed Act.Currently, there is no law/Act for dataprotection in India....

Facebook initially said the primary purpose for the acquisition was Onavo's data compression technology, which could help with its efforts to bring internet connectivity to emerging markets ... Facebook knows what you've been doing (if you use Onavo Protect). The Onavo Protect app that is available on iOS and Android is billed as a way for users to keep data secure and private by creating a virtual private network (VPN)....

All of the state's 800 police departments supplied detailed data from 2016, including demographic information on the civilians and officers, the type of call that led to the violence and the officers' justification for using force ... "A necessary part of the discussion is knowing the facts and having the data to inform the creation of effective plans to advance sound criminal justice policies."....

In response to the propaganda piece recently published by Protect Our Wildlife I would like to clarify a few points ... The department’s position isbased on over two decades of scientific data derived from the legally required surrender of every otter trapped to the department....

In an&nbsp;interview Thursday with the EW MorningLive radio show, Nikolaj Coster-Waldau, who plays Jaime Lannister on the show, says he thinks the network should employ an old-school approach to protect future content....

El Salvador lawmakers on Thursday unanimously voted to abolish a controversial, 23-year-old law that allowed men to marry underage girls they had impregnated, a practice that critics charged protected sexual assailants from criminal prosecution ... government data....

Bitcoin Cash’s price rose above the $400 mark today, breaking the rangebound market trend of the�past several days. The cryptocurrency climbed as high as $406 today, according to data from�CoinMarketCap ... The result ... Have breaking news or a story tip to send to our journalists? Contact us at [email�protected]....

Still, nearly 80 people have been hurt in wildfires in the past week alone, according to the civil protection service. Last Saturday, when a record 268 fires blazed countrywide, the government requested water planes and firemen from other European countries... More than 163,000 hectares of forest have been lost there, more than three times higher than the average of the last 10 years, according to EU data. ....

We hope that other businesses will follow KFC’s example to send a clear message that our chicken is world-class and that we need to stand together to protect this crucial industry." ... According to data from the South African Revenue Service, 48.1% of poultry imports in 2016 were from the EU, while 41.7% were from Brazil... gokoc@businesslive.co.za ....

El Salvador lawmakers unanimously voted to remove a controversial, 23-year-old law that allowed men to marry underage girls that they impregnated, a practice that essentially gave protection to sexual assailants from criminal prosecution, according to Reuters ... minors who are either married or cohabiting, according to El Salvador government data....

That same year, Khalil launched The OrangeHouseProject -- a turtle conservation and eco-tourism project -- to help protectLebanon's turtles ... She has presented her findings at MEDASSET's biennial conference, and makes her data freely available ... "I managed to protect most of them," Khalil says....

"She gave birth through C-section today ... "The surgery was uneventful ... Surgery ... India has a grim record of sexual assaults on minors with 20,000 cases of rape or sexual assaults reported in 2015, according to government data. Separately, rights groups condemned India's plan to deport 40,000 Rohingya Muslims, saying India should abide by its legal obligations and protect the stateless refugees who face persecution in Myanmar ... ....